Data Security Bundle Installation Service for ECS
Overview
This service is designed for customers who have purchased the Data Security Bundle for Dell ECS and need installation and configuration assistance deploying the Ransomware Defender feature.
Dell SKU: AD154080 | Superna Product Code: EYEGLASS-P032-INS
- Service Delivery: Remote sessions for audio, video, and screen sharing via Zoom, VPN, or alternate remote access to the customer's ECS equipment. Estimated three (3) hours over a span of 1–2 days with dedicated customer technical resources.
- Operating Hours: Monday to Friday, 9 am – 4 pm in your local time zone, excluding major holidays.
- Service Scope: Covers a single clustered ECA agent installation and configuration, with up to 2 collocated ECS Clusters.
- Terms and Conditions:
- Exclusions:
- This is not a consulting service. Superna resources are not authorized to provide design recommendations for Disaster Recovery features.
- Hands-on changes to external IT components, such as DNS, Active Directory, ECS, or other non-Superna supplied products.
- Service delivery requires customers to have hands-on knowledge of all external IT components.
Prerequisites
- Complete a Pre-Installation Questionnaire Form.
- Send a scheduling request to services@superna.net.
- Core Agent Appliance is installed.
- On the day of installation, confirm availability of the DNS administrator to make changes if the above steps require debugging or were misconfigured.
- Firewall ports opened as per documentation for ECA clusters.
Service Methodology Flow
ECA (Extended Cluster Agent) Installation and Configuration
-
ECA Agents Installation Phase — Remote installation with customer to accomplish the following:
- Prerequisite — Gather site installation requirements from the submitted installation questionnaire.
- Configuration Phase — Remote
- Apply license.
- Edit configuration file on agent startup.
- Start up clustered agent code.
- Completed.
Ransomware Defender
-
Test and Configuration Phase
- Configure the Security Guard feature:
- Validate successful execution.
- Configure schedule.
- Knowledge transfer on log file validation for Security Guard.
- Enable monitor mode to baseline user behavior.
- Review the Security Assessment on the Enforcement section in the admin guide.
- Over 2–3 weeks, schedule validation sessions: Health Check and Knowledge Transfer.
- Configure the Security Guard feature:
-
Knowledge Transfer Phase
- How to enable production mode.
- Operational cluster management section.
- How to process security incidents workflow from the admin guide — How to respond to Security Events for Warning, Major, or Critical Events.
- How and when to make whitelist changes when introducing new server applications that write data to ECS.
- UI walkthrough.